By Topic

Internet Technology and Applications, 2010 International Conference on

Date 20-22 Aug. 2010

Filter Results

Displaying Results 1 - 25 of 580
  • ITAP 2010 [Title page]

    Publication Year: 2010, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (292 KB)
    Freely Available from IEEE
  • ITAP 2010 [Copyright notice]

    Publication Year: 2010, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (31 KB)
    Freely Available from IEEE
  • ITAP 2010 Welcome

    Publication Year: 2010, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (84 KB)
    Freely Available from IEEE
  • ITAP 2010 Conference Committee

    Publication Year: 2010, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (74 KB)
    Freely Available from IEEE
  • A New Idea to Simulate Performance of VoIP Network with OPNET

    Publication Year: 2010, Page(s):1 - 5
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (519 KB)

    It needs to consider the establishment and release of IP telephony signaling-SIP or H.323 while analyzing VoIP network performance with OPNET, involving complex protocol configuration such as MGCP. What's more, the simulation efficiency will be greatly reduced in large-scale network. This paper presented an new idea to study the performance of VoIP network, it used the built-in hybrid simulation m... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance Analysis on Ping-Pong Handoff in Mobile IPV6

    Publication Year: 2010, Page(s):1 - 4
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (414 KB) | HTML iconHTML

    Considering lack of comparative studies on Ping-pong movement, comprehensive evaluations were carried out to estimate the impact of layer-3 handoff latency on End-to-End TCP for mobile IPv6 and its extensions. Results show that FHMIPv6, which has 273ms overall handoff delay, 93.867 Kbytes/s average goodput and 9.125% packet loss rate, performs better than HMIPv6 and FMIPv6 frameworks under Ping-po... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Research on the Application of Ant Colony Algorithm at Behavior Clustering of Network Users

    Publication Year: 2010, Page(s):1 - 4
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (333 KB) | HTML iconHTML

    It is obvious that internet has become a key media to share resources and exchange information. As a special category of social activities, the behavior from network users normally shows its complexity and diversity, which makes people pay an increased attention to study and manage it. Based upon the formation mechanism of ant colony, this paper proposes an ant colony algorithm to do cluster analy... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Service Ranking Based Adaptive Bandwidth Allocation Scheme and Performance Simulations

    Publication Year: 2010, Page(s):1 - 4
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (281 KB) | HTML iconHTML

    Service ranking based adaptive bandwidth allocation scheme is proposed on the basis of existing bandwidth allocation methods. Firstly, bandwidth allocation scheme is depicted and system model as well as mathematical analysis is given. Then, performance and feasibility of this scheme is explored via simulation experiments. Finally, the summarization is given and future working direction is pointed ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Efficient Mobility Management Scheme for Hierarchical Mobile Ipv6 Network

    Publication Year: 2010, Page(s):1 - 4
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (418 KB)

    An efficient mobility management scheme for hierarchical mobile IPv6 (EHMIPv6) is propose in this paper to reduce registration flows in the network. In EHMIPv6, we use primary MAP to process mobile node's regional registrations, and assistant MAP to deliver data packets for mobile node, respectively. And the primary MAP is usually chosen from the MAPs with larger coverage to avoid frequent home re... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Congestion Control Algorithms Based on Network Measurement in Next-Generation Networks

    Publication Year: 2010, Page(s):1 - 4
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (356 KB) | HTML iconHTML

    Congestion control is the key techniques of Next-Generation-Networks. The classical TCP congestion control such as RED is difficult to configure parameters and the average queue length is related to the load level. A network-measurement based on congestion control algorithm is proposed, the essential idea is introduce macroscopic guidance according to network measurement, the measurement facilitie... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Investigation of Modeling and Simulation of Troposcatter Scatter Channel

    Publication Year: 2010, Page(s):1 - 4
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (313 KB)

    The simulation model of troposcatter scatter channel based on Rayleigh fading is given in this paper. On the basis of comparing with some fading channel models, the statistical characteristics of two kinds of channel models is discussed by analyzing fading behaviors of troposcatter scatter, and random envelopes of different paths and degree of approximation are analyzed. According to the detailed ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Wireless Environmental Temperature Monitoring System

    Publication Year: 2010, Page(s):1 - 4
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (304 KB)

    This system is a wireless environmental temperature monitoring device within 10m, which includes a monitoring terminal and a maximum of 255 nodes. Monitoring terminal and each node communicate by the ways of the UART asynchronous communication. In the transmitter, the control information and data packaged by the two top-down protocols is send to the transmitter modulation input in the form of a st... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Identification and Performance Analysis of the Fractal Characteristics of Network Traffic

    Publication Year: 2010, Page(s):1 - 4
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (675 KB) | HTML iconHTML

    Network traffic has single-fractal characteristic, or self-similar characteristic, at the global time scale; and multi-fractal characteristic at local time scale. The linear or nonlinear relationship between the scaling function and the time scale can be used to determine the single-fractal or multi-fractal characteristic of the network traffic. Increasing the buffer size will reduce the packet lo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Computer Network with Intelligent Disks

    Publication Year: 2010, Page(s):1 - 5
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (553 KB)

    Almost no their own hard disks has been equipped for some network devices, so the data that followed will overwrite the former data when their memory is full, thus result in the data lose and resending the data. This paper introduces a workable way to solve this issue-Computer Network with Intelligent Disks. When mass data need to be accessed by above devices, they can be stored in this kind of co... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Visualization of All the IP Addresses That Host a Publicly Accessible Web Server

    Publication Year: 2010, Page(s):1 - 5
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1026 KB) | HTML iconHTML

    Every valid IP address was checked for the presence of a publicly accessible web server on port 80. To better understand the distribution of web servers across the available address space, we map the results to a 2-dimentional Cartesian plane. The resulting graph is presented and discussed. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Improved Multi-Fractal Network Traffic Model Based on Video Traffic

    Publication Year: 2010, Page(s):1 - 5
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (508 KB)

    After pointing out the limitation of the traditional multifractal wavelet model (MWM), and analyzing multi-resolution characteristics of real video traffic, this paper proposes an adjustable scale coefficient MWM model. The improved MWM can adjust wavelet coefficients and multiplicative coefficients based on their distribution of the real network traffic, which can suit the real network characteri... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research and Design of Plug-Type IP Information Monitoring Equipment Based on Parallel Algorithm

    Publication Year: 2010, Page(s):1 - 4
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (469 KB)

    This paper presents a research and design method of plug-type IP information monitoring equipment based on parallel algorithm. It mainly uses the Ethernet hub and field-programmable gate array (FPGA) technology to implement the detection and management of full-duplex IP datagram. Meanwhile using time interval as a judge to analyze and process IP datagram. By detecting, the device can meet the desi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Novel Genetic Algorithm for Static Virtual Topology Reconfiguration in IP/WDM Optical Networks

    Publication Year: 2010, Page(s):1 - 5
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (472 KB)

    The transport traffic in WDM optical networks are provided to the networks customers in the form of lightpath via virtual topology reconfiguration (VTR), thus the algorithm to perform such an VTR has crucial impact on the resource usage efficiency. This paper proposes the routing algorithm of the Virtual Topology Reconfiguration based on the Genetic Algorithm (VTR-GA) for static traffic in the IP/... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Power Consumption Monitor for Wireless Sensor Nodes

    Publication Year: 2010, Page(s):1 - 4
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (546 KB)

    Low power is a key element in the design of a wireless sensor node. It is necessary to know the power consumption details of sensors, microcontroller, transceiver, and other components before optimization. However, different application has different configuration. It isn't convenient to create theoretic model for each platform. We proposed a portable power consumption monitoring testbed for wirel... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Notice of Retraction
    Architecture of DigitalCity Based on XML and Web Services in the Internet

    Publication Year: 2010, Page(s):1 - 4
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (891 KB)

    Notice of Retraction

    After careful and considered review of the content of this paper by a duly constituted expert committee, this paper has been found to be in violation of IEEE's Publication Principles.

    We hereby retract the content of this paper. Reasonable effort should be made to remove all past references to this paper.

    The presenting author of this paper has the option ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Trustworthy Network Architecture Based on Logic Trust Mechanism

    Publication Year: 2010, Page(s):1 - 6
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (577 KB)

    Network is an important foundation for information society, but the current network cannot be trustworthy. To solve this problem, the authors proposed the concept of the object fingerprint based on multi-signature technology at first and have been studied its realization and applications in the research of trustworthy network architecture. Without conditions of changing the original network archit... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Influence Analysis of HDLC Frame Alignment and ESC on Link Transport Efficiency of POS Signal

    Publication Year: 2010, Page(s):1 - 4
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (247 KB) | HTML iconHTML

    With the ever improvement of SDH backbone network at home and abroad and the exponential growth of IP services, more and more attention are paid to POS signal. POS technology not only is the most important IP transmission way of backbone network, but also will be one of the core technologies in the next generation optical transmission network. In this paper the formulas for influence of HDLC frame... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Protocol Design and Implementation of a JXTA Based P2P-SIP System

    Publication Year: 2010, Page(s):1 - 4
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (232 KB) | HTML iconHTML

    A P2P-SIP architecture relying on open-source SIP stacks and JXTA platform is proposed, where the centralized SIP registration and location are implemented via P2P publishing and service location, respectively. A novel P2P-SIP protocol-JXP is presented and a prototype is designed and developed based on LINUX. The prototype system has been developed for transporting typical VoIP call controls and r... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Ant Simulated Annealing Routing Algorithm for Wireless Mesh Network

    Publication Year: 2010, Page(s):1 - 4
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (423 KB)

    Considering the instability of link quality, a new routing algorithm for WMN, namely ASA, based on Ant Colony Optimization algorithm(ACO) and simulated annealing algorithm(SA) was presented. This algorithm not only combined the adaptation, robustness and distributed, decentralized merit of ACO but also used SA to remedy the weakness of ant algorithm and increase the convergence rate of ACO. Simula... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Construction of Provider-Independent Overlay Networks with High Resilience

    Publication Year: 2010, Page(s):1 - 4
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (329 KB) | HTML iconHTML

    Due to its distributed and autonomous characteristics, it is difficult to change the Internet infrastructure in support of new services. In this context overlay networks provide a promising means of offering a supplement to the existing "best efforts" delivery mechanism. This paper discusses one of the key issues: topology construction in the context of provider-independent overlay networks. A heu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.